Video Screencast Help
Information Unleashed
Showing posts tagged with Internet security
Showing posts in English
khaley | 15 Apr 2013 | 0 comments

Targeted_Attacks_in2012_1280x394.jpgSome of us are numbers people.  We like nothing more than digging into a big batch of numbers.  I confess I’m the other type of person. I still fumble around a spreadsheet and can’t add without the aid of a calculator. For numbers people the ISTR is a terrific document. This year’s report is 160 pages of numbers that do a pretty good job of describing the threat landscape. If you’re a numbers person, feel free to dig in to the full report. You can also check out highlights in this graphic.

If you’re like me, and not really a numbers person, then read on. I’ve bullied my way through the numbers so you don’t have to. Let me give you the highlights, some of the interesting...

khaley | 21 Dec 2012 | 2 comments

Are malware authors becoming more unpleasant? The amount of cyber-crime goes up year after year and 2013 will be no exception. Bad guys will continue to dream up new ways to rip people off.  Sure, we’ll be stolen from, spied on and threatened in 2013. None of this will be new. But there is a new trend that started in 2012 and seeming set to take off in 2013. I call it nastiness.

We didn’t call out this trend in our 2013 predictions. But if you look at those predictions you can see it. I can’t tell you why this is or why it started. This nastiness is happening in targeted attacks and in massive attacks. They are quite separate trends—done for quite different reasons and...

khaley | 08 Nov 2012 | 0 comments

With this year quickly coming to an end, it’s time for us at Symantec to publish our predictions on what we expect will happen in the world of cybersecurity for the coming year.

Most of us at Symantec tend to be fact-based, data-driven individuals. However, predicting the future always involves a bit of speculation. To derive our predictions for 2013, we began by talking to hundreds of security experts at Symantec to gather their thoughts and ideas. Then, we peer-reviewed these ideas, argued a lot, and boiled it all down to a handful of predictions that we felt would provide real insight into where we believe the threat landscape is going.

While these predictions are based on what we see today, they also reflect where we think things are going based on our years of...

khaley | 16 Oct 2012 | 0 comments

By visiting which type of website are you more likely to get infected with malware?  A religious site or an adult site?  I’ve been asking that question to computer security professionals for almost a year now.  If you’ve read the Internet Security Threat report version 17 you know the answer. It’s religious sites.  We discovered that a higher percentage of religious sites have been hacked into and loaded up with malware by the bad guys than adult sites.  

I like to quiz people on this one, because it doesn’t meet expectations.  Some people sense a set up in the question, but most answer that you’re more likely to get infected on a adult website.  The real message I try to leave behind with...

khaley | 20 Sep 2012 | 0 comments

 

In recent years there has been no shortage of news on highly sophisticated threats that are evading detection for long periods, causing serious damage to organizations and stealing valuable information. These are often directed at defense or other government targets, but we still feel the paranoia that we could be the next victim. While we worry about these highly targeted threats, looking for new solutions to protect us from these attacks, are we ignoring simple and effective steps to get the most out of our existing solutions? Are we neglecting our patches and updates, so worried about high-profile threats that simple, common threats easily enter our network?

Whatever new threats are developed, it will never be advisable to neglect the most basic security policies and practices. While we need to be aware of the evolution of security trends, it’s the little things that can still kill us. This point is further explored in my recent guest post in Forbes,...

khaley | 29 Apr 2012 | 0 comments

When it comes to Internet security, organizations shouldn’t feel like it’s only a matter of time before they suffer a catastrophe. But at the same time, it’s important to recognize that there is no single preventive measure that will guarantee safety from all attacks. Unfortunately, there are so many kinds of attacks that it’s difficult for users to know what threats are the most dangerous, and how to stay on top of them, but each can be dealt with individually. Each year Symantec publishes the Internet Security Threat Report to provide users with a better understanding of the threat landscape, and in a sense helps provide an alliance to protect them from being blindsided.

Symantec’s 2011 Internet Security Threat Report reveals that threats are skyrocketing and are...

Marian Merritt | 25 Apr 2012 | 0 comments

With more than 840 million registered users, Facebook has long been everyone’s favorite online location. We update our status, check in to our favorite shops and restaurants, play social games, post family photos and live our lives increasingly in the top global social networking space. With this popularity, Facebook has realized they can do more to help educate members about the best ways to remain protected while enjoying everything Facebook has to offer.

Today, Facebook and Symantec announce a great partnership. Facebook has a security site, the Facebook AV Marketplace, where new-to-Norton Facebook users can download a free 6-month copy of our flagship Norton AntiVirus for either a Mac or a PC. So if you aren’t using any security on your computer, or you’ve wanted to try Norton for free, now is a great time to do so. You can learn more at the ...

CJ Desai | 30 Mar 2012 | 0 comments

 

When it comes to protecting your IT resources, endpoint security is a no-brainer. Employing basic protection such as antivirus software has been an integral part of security for so long that endpoint protection seems like one of the few constants in technology.

Except, it isn’t.

Two big trends are changing the way endpoint security is handled. First, the very definition of endpoints is changing. Once the term just meant desktop computers and servers, but it now also encompasses mobile devices such as laptops, smartphones and tablets, as well as virtual servers and desktops – any place corporate data can be accessed. And that data is being stored in more and more places. Gone are the days of a single, fortress-like IT infrastructure protecting all your information...